Firefox have released version 2.0.0.6 to address to fix two security issues: Unescaped URIs passed to external programs:http://www.mozilla.org/security/announce/2007/mfsa2007-27.html Privilege escalation through chrome-loaded about:blank windows:http://www.mozilla.org/security/announce/2007/mfsa2007-26.html A related security advisory has been released which says: “…it is still possible to launch a filetype handler based on extension rather than the registered protocol handler. A way to exploit […]
It’s all Brian’s fault – here I am, after taking the weekend off, escaping to my holiday unit to read Harry Potter, trying to catch up on the millions of emails that arrived during my 24 hour absence (and the 3 million spam hiding said million important emails), when I spot that Brian wants me to do […]
I admit, there are some statements in the first video that I would argue with (such as 50% of all spam coming from bots – it is far more than that – and some of the technical statements are inaccurate) but overall the videos are a good start and they get the message across. Their target […]
Symptom 1 A site address that uses a wildcard character overrides a site address that uses the exact name. For example, assume that you have added the “*.subdomain.domain.com” site address to the Local Intranet security zone. You also add the “server.subdomain.domain.com” site address to the Trusted Sites security zone. When you access the following Web […]
Consider the following scenario. You use Dynamic Data Exchange (DDE) to integrate a program into Windows Internet Explorer 7. In this program, you configure some options to open links in new Internet Explorer windows. However, when you try to open a link in a new window, Internet Explorer 7 opens the link in a window […]
Consider the following scenario. You download an ActiveX control. You view the file properties for the control in the Downloaded Program Files folder. You click the Dependency tab in the Properties dialog box. In this scenario, the Size (bytes) field may not display the file size in bytes. Instead, the Size (bytes) field displays the […]
A trackback on my site pointed me to www.eq2flames.com/general-gameplay/8990-seeking-ideas-make-people-less-upset-about-ads-20.html Now, ever since this blog (and many others) became the target of sustained attempts to seed the blog with comments pointing to URLs that attempt to infect systems with winfixer malware, I check trackbacks and comments and delete those that are a risk to visitors. The […]
A common request by developers is that they want to run IE6 and IE7 side by side for testing purposes. To address this need (and help developers avoid having to use the various hacks that almost/kinda/close enough met the developers’ need to run IE6 and IE7 on the same machine) the IE team started offering, […]
“Earlier today the Chinese government and the FBI announced the largest bust of counterfeit software manufacturing or distribution ever. The bust by the Chinese Public Security Bureau (PSB) in cooperation with the FBI and help from Microsoft and others was of a syndicate, headquartered in China’s Southern Guangdong province that is estimated to have sold […]
Yep, I’ve been hit by this one :o( Daylight saving time (DST) was introduced to Western Australia for a three-year trial period that started December 3, 2006. The Microsoft Exchange Server 2003 Collaboration Data Objects (CDO) tables and Microsoft Office Outlook Web Access tables do not contain updated DST transition times for the Western Australia […]